Nexterm relies on WebSockets for terminal sessions (SSH, VNC, RDP) and real-time state updates. Any reverse proxy you place in front of Nexterm must be configured to forward WebSocket upgrade requests, otherwise connections will fail or disconnect immediately.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/gnmyt/Nexterm/llms.txt
Use this file to discover all available pages before exploring further.
Nginx
The Nginx configuration below proxies all traffic to Nexterm and includes the required WebSocket upgrade headers. Replacenexterm.yourdomain.com with your own domain and adjust the upstream address if Nexterm is not running on the same host.
proxy_read_timeout 86400 sets a 24-hour timeout. This prevents Nginx from closing long-lived WebSocket connections (such as active terminal sessions) during periods of inactivity.443 ssl:
Apache
Apache requires theproxy, proxy_http, proxy_wstunnel, and rewrite modules. Enable them before applying the configuration:
RewriteRule intercepts WebSocket upgrade requests and forwards them through mod_proxy_wstunnel. Regular HTTP requests fall through to the ProxyPass directives.
Caddy
Caddy handles WebSocket proxying and automatic HTTPS certificate provisioning with no additional configuration. The minimalCaddyfile for Nexterm is:
Traefik (Docker)
Add the following labels to your Nexterm service indocker-compose.yml. Traefik handles WebSocket forwarding automatically.
websecure entrypoint and a letsencrypt certificate resolver. Adjust the entrypoint and resolver names to match your Traefik configuration.
Cloudflare Tunnel
Cloudflare Tunnel exposes Nexterm to the internet without requiring you to open inbound firewall ports. Traffic flows through Cloudflare’s network, which also provides DDoS protection and optional Zero Trust access policies.Prerequisites
Cloudflare account
A Cloudflare account with an active domain added to it.
cloudflared installed
The
cloudflared daemon installed on the server running Nexterm.Setup
Create a tunnel in the Cloudflare dashboard
Log in to Cloudflare Zero Trust and navigate to Networks → Connectors.
- Click Create a tunnel
- Select Cloudflared as the connector type
- Give the tunnel a name — for example,
nexterm - Copy the installation command shown in the dashboard
Install and start cloudflared on your server
Paste the installation command from the previous step into a terminal on the server running Nexterm. It installs Once installed, the tunnel connector will appear as Connected in the dashboard.
cloudflared and registers the tunnel as a system service.Add a public hostname
In the tunnel configuration, go to the Public Hostname tab and click Add a public hostname. Fill in the fields as follows:
Click Save tunnel.
| Field | Value |
|---|---|
| Subdomain | nexterm (or your preferred subdomain) |
| Domain | Select your Cloudflare domain |
| Type | HTTP |
| URL | localhost:6989 |
Cloudflare Tunnel uses HTTP between
cloudflared and Nexterm on your server (localhost:6989). The connection from your browser to Cloudflare is encrypted with TLS managed by Cloudflare. This is the recommended setup — do not set the tunnel type to HTTPS unless you have also configured Nexterm’s built-in SSL.